--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerability in Ivanti Products' version: '1.0' number: '2022-005' date: 'January 19, 2022' --- _History:_ * _19/01/2022 --- v1.0 -- Initial publication_ # Summary On January 17th, Ivanti updated its advisory related to `CVE-2021-44228` vulnerability affecting some of its products. While this CVE affects the Java logging library `log4j` [1], all products using this library are vulnerable to Unauthenticated Remote Code Execution. # Technical Details The vulnerability exists in the Java logging library `log4j`. An unauthenticated remote attacker might exploit this vulnerability by sending specially crafted content to the application to execute malicious code on the server [1]. # Affected products |Product|affected versions|Mitigation / Fix| |---|---|---| |Avalanche|6.3.0, 6.3.1, 6.3.2, and 6.3.3|Available [3]| |Ivanti File Director|2020.3, 2021.1, 2021.3|Available [4]| |MobileIron|See [5]|Available [5]| # Recommendations Ivanti and CERT-EU strongly recommends to apply mitigations or fixes mentioned in the Affected Products section. # References [1] [2] [3] [4] [5]